On Wed, 2003-09-03 at 15:29, Henrik Nordstrom wrote:
> On Wednesday 03 September 2003 06.09, [EMAIL PROTECTED] wrote:
> 
> > I hope my deductions make sense,
> 
> It does. The only complications is how to find a good way of merging 
> the access logs from two or more proxies to build the request graphs. 
> It is not always trivial to identify which requests on a upstream 
> proxy belongs to the downstream request, but by keeping the time in 
> synch (i.e. NTP) and sorting on time you can most likely make it 
> without to much fuzz.

One could use external ACL tags to tag requests that don't have ID's,
and assign them an id specific to the first cache that recieves it.

Not much use for extant infrastructure, but worth considering...

Rob
-- 
GPG key available at: <http://members.aardvark.net.au/lifeless/keys.txt>.

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to